1 |
M. S. Hwang, 'Cryptanalysis of remote login authentication scheme,' Computer Communications, Vol. 22, no. 8, pp. 42-744, 1999
DOI
ScienceOn
|
2 |
C.W. Lin, J.J. Shen, and M.S.Hwang, 'Security enhancement for optimal strong- password authentication protocol,' ACM Operating Systems Review, Vol. 37, no. 2, April 2003
|
3 |
이규환, 이주화, 김재현, '무선 메쉬 네트워크의 패스워드 기반 인증 프로토콜,' 전자공학회논문지, 제44권, 제TC-5호, pp. 54-62, 2007
과학기술학회마을
|
4 |
C. K. Chan and L. M. Cheng, 'Cryptanlysis of timestamp-based password authentication scheme,' Computers & Security, Vol. 21, no. 1, pp. 74-76, 2002
DOI
ScienceOn
|
5 |
Y. L. Tang, M. S. Hwang, and C. C. Lee, 'A simple remote user authentication scheme. Mathematical and Computer Modelling,' Vol. 36, pp. 103-107, 2002
DOI
ScienceOn
|
6 |
김천식, 윤은준, 홍유식, 문남미, '이러닝 시스템에서 사용자 인증을 위한 키스트로크의 응용 기술,' 전자공학회논문지, 제45권, 제CI-5호, pp. 25-31, 2008
과학기술학회마을
|
7 |
M. S. Hwang, 'A remote password authentication scheme based on the digital signature method,' International Journal of Computer Mathematics, Vol. 70, pp. 657-666, 1999
DOI
|
8 |
W. H. Yang and S. P. Shieh, 'Password authentication schemes with smart cards,' Computers & Security, Vol. 18, no. 8, pp. 727-733, 1999
DOI
ScienceOn
|
9 |
H. Y. Chien, J. K. Jan, and Y. M. Tseng, 'A modified remote login authentication scheme based on geometric approach,' Journal of Systems and Software, Vol. 55, pp. 287-290, 2001
DOI
ScienceOn
|
10 |
M. S. Hwang, C. C. Lee, and Y. L. Tang, 'An improvement of SPLICE/AS in WIDE against guessing attack,' International Journal of Informatica, Vol. 12, no. 2, pp. 297-302, 2001
|
11 |
C. M. Chen and W. C. Ku, 'Stolen-verifier attack on two new strong-password authentication protocols,' IEICE Transactions on Communications, Vol. E85-B, no. 11, pp. 2519-2521, November 2002
|
12 |
C. W. Lin, C. S. Tasi, and M. S. Hwang, 'A new strong-password authentication scheme using one-way hash function,' Journal of Computer and Systems Sciences International, Vol. 45, no. 4, pp. 623-626, 2006
DOI
ScienceOn
|
13 |
이성운, 김현성, 유기영, '패스워드를 변경 가능한 효율적인 패스워드 기반의 인증된 키 교환 프로토콜,' 전자공학회논문지, 제42권, 제TC-2호, pp. 33-38, 2005
과학기술학회마을
|
14 |
M. Sandirigama, A. Shimizu, and M. T. Noda, 'Simple and secure password authentication protocol (sas). IEICE Transactions on Communications,' Vol. E83-B, no. 6, pp. 1363-1365, June 2000
|
15 |
C. L. Lin, H. M. Sun, and T. Hwang, 'Attacks and solutions on strong-password authentication,' IEICE Transactions on Communications, Vol. E84-B, no. 9, pp. 2622-2627, September 2001
|
16 |
L. H. Li, I. C. Lin, and M. S. Hwang, 'A remote password authentication scheme for multi-server architecture using neural networks,' IEEE Transactions on Neural Networks, Vol. 12, no. 6, pp. 1498-1504, 2001
DOI
ScienceOn
|
17 |
A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, 'Handbook of applied cryptography,' CRC Press, New York, 1997
|
18 |
C. C. Lee, L. H. Li, and M. S. Hwang, 'A remote user authentication scheme using hash functions,' ACM Operating Systems Review, Vol. 36, no. 4, pp. 23-29, 2002
DOI
ScienceOn
|
19 |
M. S. Hwang and L. H. Li, 'A new remote user authentication scheme using smart cards,' IEEE Transactions on Consumer Electronics, Vol. 46, no. 1, pp. 28-30, 2000
DOI
ScienceOn
|
20 |
B. Schneier, 'Applied cryptography protocols,' Algorithms and Source Code in C, 2nd edn. John Wiley, Chichester, 1995
|
21 |
권정호, 박종태, 'EEE 802.11 무선랜에서 고속 이동성 지원을 위한 사용자 사전 인증 기법,' 전자공학회논문지, 제44권, 제TC-10호, pp. 191-200, 2007
|
22 |
강명희, 유황빈, '유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델,' 전자공학회논문지, 제42권, 제CI-4호, pp. 25-32, 2005
과학기술학회마을
|
23 |
E. J. Yoon, E. K. Ryu, and K. Y. Yoo, 'Secure SE-OSPA protocol against DoS attack,' Proceeding of LSRC Summer Conference in Korean Institute of Information Scientists and Engineers, Vol. 2, no. 1, pp. 27-31, 2003
|
24 |
송영상, 신인철, '서명을 이용한 스마트카드 사용자 인증을 위한 COS 설계,' 전자공학회논문지, 제41권, 제CI-4호, pp. 421-430, 2004
과학기술학회마을
|
25 |
C. C. Lee, M. S. Hwang, and W. P. Yang, 'A flexible remote user authentication scheme using smart cards,' ACM Operating Systems Review, Vol. 36, no. 3, pp. 46-52, 2002
DOI
ScienceOn
|
26 |
L. Lamport, 'Password authentication with insecure communication,' Communication of ACM, Vol. 24, pp. 770-772, 1981
DOI
ScienceOn
|